Subcriber Service Switch

Similar documents
PPPoE Session Limit per NAS Port

RADIUS Logical Line ID

PPPoE Session Limits per NAS Port

Configuring the Physical Subscriber Line for RADIUS Access and Accounting

RADIUS Logical Line ID

Define Interface Policy-Map AV Pairs AAA

Configuring NAS-Initiated Dial-In VPDN Tunneling

Configuring the Physical Subscriber Line for RADIUS Access and Accounting

Monitoring PPPoE Sessions with SNMP

virtual-template virtual-template template-number no virtual-template Syntax Description

This feature was introduced. This feature was integrated into Cisco IOS Release 12.2(27)SBA.

Define Interface Policy-Map AV Pairs AAA

QoS: Classification, Policing, and Marking on LAC Configuration Guide, Cisco IOS Release 12.4T

Cisco IOS VPDN Command Reference

PPPoE on ATM. Finding Feature Information. Prerequisites for PPPoE on ATM. Restrictions for PPPoE on ATM

Configuring the Layer 2 Tunnel Protocol Access Concentrator and Network Server

Configuring the Cisco 827 Router as a PPPoE Client With NAT

Configuring Client-Initiated Dial-In VPDN Tunneling

Broadband Access Aggregation and DSL Configuration Guide, Cisco IOS XE Release 3S

Configuring ISG Control Policies

Provisioning Broadband Aggregators Topics

Autosense for ATM PVCs and MUX SNAP Encapsulation

PPPoE Service Selection

QoS: Per-Session Shaping and Queuing on LNS

Extended NAS-Port-Type and NAS-Port Support

Configuring a Cisco 827 Router to Support PPPoE Clients, Terminating on a Cisco 6400 UAC

RADIUS Tunnel Attribute Extensions

Per-Session QoS. Finding Feature Information

Finding Feature Information

PPPoE Circuit-Id Tag Processing

Autosense of MUX/SNAP Encapsulation and PPPoA/PPPoE on ATM PVCs

PPPoE Service Selection

Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images

Broadband High Availability Stateful Switchover

This feature was introduced. This feature was integrated into Cisco IOS Release 12.2(27)SBA.

Broadband Access Aggregation and DSL Configuration Guide, Cisco IOS XE Release 3S (ASR 1000)

Broadband Access Aggregation and DSL Configuration Guide, Cisco IOS XE Fuji 16.7.x

Broadband Access Aggregation and DSL Configuration Guide, Cisco IOS XE Fuji 16.8.x

VPDN Tunnel Management

management server password through sessions throttle

Cisco IOS Broadband Access Aggregation and DSL Command Reference

Configuring Layer 2 Tunneling Protocol (L2TP) over IPSec

Remote Access MPLS-VPNs

Broadband Access Aggregation and DSL Configuration Guide, Cisco IOS Release 12.2SX

Cisco recommends that you have knowledge of End-to-End Layer 1 connectivity is User Priority (UP).

isco Cisco PPPoE Baseline Architecture for the Cisco UAC

aaa max-sessions maximum-number-of-sessions The default value for aaa max-sessions command is platform dependent. Release 15.0(1)M.

Cisco PPPoE Baseline Architecture for the Cisco UAC 6400

Extended NAS-Port-Type and NAS-Port Support

RADIUS Commands. Cisco IOS Security Command Reference SR

Configuring Virtual Template Interfaces

Configuring the Managed IPv6 Layer 2 Tunnel Protocol Network Server

IEEE 802.1Q-in-Q VLAN Tag Termination

Configuring PPPoE Client on the Cisco 2600 to Connect to a Non Cisco DSL CPE

thus, the newly created attribute is accepted if the user accepts attribute 26.

HP VSR1000 Virtual Services Router

RADIUS Attributes. RADIUS IETF Attributes

PPP over Frame Relay

Set Inner CoS Bits for QinQ

The router sends hello keepalive packets at 60 second intervals.

Configuring PPP over ATM with NAT

Cisco DSL Router Configuration and Troubleshooting Guide Cisco DSL Router Acting as a PPPoE Client with a Dynamic IP Address

Troubleshooting ISG with Session Monitoring and Distributed Conditional Debugging

Broadband Scalability and Performance

Configuring PPP over Ethernet with NAT

RADIUS Vendor-Specific Attributes (VSA) and RADIUS Disconnect-Cause Attribute Values

IP Tunneling. GRE Tunnel IP Source and Destination VRF Membership. Tunnel VRF CHAPTER

PPPoE Client DDR Idle-Timer

Lawful Intercept Architecture

thus, the newly created attribute is accepted if the user accepts attribute 26.

Configuring the Cisco Router and VPN Clients Using PPTP and MPPE

de-bit through exp Cisco IOS Wide-Area Networking Command Reference 1

DHCP Server RADIUS Proxy

MPLS VPN Half-Duplex VRF

RADIUS Attribute 66 Tunnel-Client-Endpoint Enhancements

PPPoE Agent Remote-ID and DSL Line Characteristics Enhancement

Effective with Cisco IOS Release 15.0(1)M, the ssg default-network command is not available in Cisco IOS software.

Configuring Security on the GGSN

PPPoE Agent Remote-ID and DSL Line Characteristics Enhancement

L2TP IPsec Support for NAT and PAT Windows Clients

Providing Connectivity Using ATM Routed Bridge Encapsulation over PVCs

Table of Contents 1 PPP Configuration Commands PPPoE Configuration Commands 2-1

Configuring Authentication, Authorization, and Accounting Functions

pri-group timeslots pri-group timeslots range nfas_d [primary backup none] nfas_int number nfas_group group-id-number pri-group timeslots range

Configuring a Cisco 827 Router Using PPPoA With CHAP and PAP

Configure ISDN Connectivity between Remote Sites

Frame Relay Switching Diagnostics and Troubleshooting

Point-to-Point Protocol (PPP)

Cisco Discovery Protocol Version 2

Multilink Frame Relay (FRF.16)

Configuring Virtual Private Networks

Providing Connectivity Using ATM Routed Bridge Encapsulation over PVCs

Configuring the Managed IPv6 Layer 2 Tunnel Protocol Network Server

Frame Relay show Command and debug Command Enhancements

Configuring Additional VPDN Features

Passwords and Privileges Commands

Using Cisco Discovery Protocol

Configuring RADIUS. Finding Feature Information. Prerequisites for RADIUS

Troubleshooting ISA with Session Monitoring and Distributed Conditional Debugging

L2TP Configuration. L2TP Overview. Introduction. Typical L2TP Networking Application

Transcription:

The Subscriber Service Switch feature directs PPP between points using a Layer 2 subscriber policy. It also provides the following features for Internet service provides (ISPs): Flexible connection options for subscribers seeking available services Flexible number of subscribers Flexible definition of services Configuration Information Configuration information is included in the How to Configure a Subscriber Service Switch Policy module in the Configuring Cisco Subscriber Service Switch Policies chapter of the Cisco IOS Broadband and DSL Configuration Guide, Release 12.4. Command Reference Information This section documents modified commands. atm pppatm passive clear pppatm interface atm clear pppoe debug pppatm debug sss aaa authorization event debug sss aaa authorization fsm debug sss error debug sss event debug sss fsm multihop-hostname show pppatm summary show pppatm trace show sss session show vpdn session subscriber access subscriber authorization enable vpdn authorize domain 1

vpn service 2

atm pppatm passive atm pppatm passive To place an ATM subinterface in passive mode, use the atm pppatm passive command in ATM subinterface configuration mode. To change the configuration back to the default (active) mode, use the no form of this command. atm pppatm passive no atm pppatm passive Syntax Description This command has no arguments or keywords. Defaults Active mode Command Modes ATM subinterface configuration Command History Release 12.2(13)T 12.2(28)SB Modification This feature was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. Usage Guidelines The atm pppatm passive command places PPP over ATM (PPPoA) sessions on an ATM subinterface in listening mode. Rather than trying to establish the sessions actively by sending out Link Control Protocol (LCP) packets, these sessions listen to the incoming LCP packets and become active only after they have received their first LCP packet. This feature is useful for L2TP access concentrators (LACs) in the broadband access deployments where thousands of PPPoA sessions are configured on LACs. When PPPoA is in the passive mode, the LAC will bring up the sessions only when the subscribers become active and not waste its processing power on polling all the sessions. For better scalability and faster convergence of PPP sessions, Cisco recommends setting the PPPoA sessions to passive mode at the LAC. Examples The following example configures the passive mode for the PPPoA sessions on an ATM subinterface: interface atm 1/0.1 multipoint atm pppatm passive range range-pppoa-1 pvc 100 199 protocol ppp virtual-template 1 3

clear pppatm interface atm Subcriber Service Switch clear pppatm interface atm To clear PPP ATM sessions on an ATM interface, use the clear pppatm interface atm command in privileged EXEC mode. clear pppatm interface atm interface-number[.subinterface-number] [vc {[vpi/]vci virtual-circuit-name}] Syntax Description interface-number.subinterface-number vc [vpi/]vci vc virtual-circuit-name ATM interface number. (Optional) ATM subinterface number. A period must precede the number. (Optional) Specifies virtual circuit (VC) by virtual path identifier (VPI) and virtual channel identifier (VCI). A slash must follow the VPI. (Optional) Specifies VC by name. Command Modes Privileged EXEC Command History Release 12.2(13)T 12.2(28)SB Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. Usage Guidelines This command clears the PPP over ATM (PPPoA) sessions in an interface, or in a VC when the VC is specified. When the clear pppatm interface atm command is used to clear sessions on an interface, PPP keepalives continue to work and can be used to detect a broken link. Examples The following example clears a PPP ATM session on ATM interface 1/0.10: Router# clear pppatm interface atm 1/0.10 Related Commands Command debug pppatm show pppatm summary Description Enables reports for PPPoA events, errors, and states either globally or conditionally on an interface or VC. Displays PPPoA session counts. 4

clear pppoe clear pppoe To clear PPP over Ethernet (PPPoE) sessions, use the clear pppoe command in privileged EXEC mode. clear pppoe {interface type number [vc {[vpi/]vci vc-name}] [vlan vlan-id] rmac mac-address [sid session-id] all} Syntax Description interface type number vc [vpi/]vci vc vc-name vlan vlan-id rmac mac-address sid session-id all Interface keyword followed by the interface type and number. (Optional) Virtual circuit (VC) keyword followed by a virtual path identifier (VPI), virtual channel identifier (VCI). A slash (/) follows the VPI. (Optional) Name of the VC. (Optional) VLAN identifier. (Optional) Remote MAC address. (Optional) Session identifier. (Optional) Specifies that all PPPoE sessions will be cleared. Command Modes Privileged EXEC Command History Release 12.2(13)T 12.3(2)T 12.2(28)SB Modification This command was introduced. The vlan vlan-id keyword and argument were added. This command was integrated into Cisco IOS Release 12.2(28)SB. Usage Guidelines Use the clear pppoe all command to clear all PPPoE sessions. Use the interface keyword and arguments and the vlan keyword and argument to clear PPPoE sessions on a specific Ethernet 802.1Q VLAN. Use the interface, vc, and vlan keywords and arguments to clear PPPoE over 802.1Q VLAN sessions on an ATM PVC. Examples The following example clears all PPPoE sessions: Router# clear pppoe all 5

debug pppatm Subcriber Service Switch debug pppatm To enable debug reports for PPP over ATM (PPPoA) events, errors, and states, either globally or conditionally, on an interface or virtual circuit (VC), use the debug pppatm command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug pppatm {event error state} [interface atm interface-number [subinterface-number]] vc {[vpi/vci]vci virtual-circuit-name} no debug pppatm {event error state} [interface atm interface-number [subinterface-number] vc {[vpi/]vci virtual-circuit-name} Syntax Description event error state interface atm interface-number [subinterface-number] vc [vpi/]vci virtual-circuit-name PPPoA events. PPPoA errors. PPPoA state. (Optional) Specifies a particular ATM interface by interface number and optionally a subinterface number separated by a period. (Optional) Virtual circuit (VC) keyword followed by a virtual path identifier (VPI), virtual channel identifier (VCI), and VC name. A slash mark is required after the VPI. Defaults No default behavior or values Command Modes Privileged EXEC Command History Release 12.2(13)T 12.2(28)SB Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. Usage Guidelines Each specific PPPoA debug report must be requested on a separate command line; see the Examples section. Examples The following is example output of a PPPoA session with event, error, and state debug reports enabled on ATM interface 1/0.10: Router# debug pppatm event interface atm1/0.10 Router# debug pppatm error interface atm1/0.10 Router# debug pppatm state interface atm1/0.10 00:03:08: PPPATM: ATM1/0.10 0/101 [1], Event = Clear Session 00:03:08: PPPATM: ATM1/0.10 0/101 [1], Event = Disconnecting 00:03:08: PPPATM: ATM1/0.10 0/101 [1], Event = AAA gets dynamic attrs 00:03:08: PPPATM: ATM1/0.10 0/101 [1], Event = AAA gets dynamic attrs 6

debug pppatm 00:03:08: PPPATM: ATM1/0.10 0/101 [1], Event = SSS Cleanup 00:03:08: PPPATM: ATM1/0.10 0/101 [0], State = DOWN 00:03:08: PPPATM: ATM1/0.10 0/101 [0], Event = Up Pending 00:03:16: PPPATM: ATM1/0.10 0/101 [0], Event = Up Dequeued 00:03:16: PPPATM: ATM1/0.10 0/101 [0], Event = Processing Up 00:03:16: PPPATM: ATM1/0.10 0/101 [2], Event = Access IE allocated 00:03:16: PPPATM: ATM1/0.10 0/101 [2], Event = Set Pkts to SSS 00:03:16: PPPATM: ATM1/0.10 0/101 [2], Event = AAA gets retrived attrs 00:03:16: PPPATM: ATM1/0.10 0/101 [2], Event = AAA gets nas port details 00:03:16: PPPATM: ATM1/0.10 0/101 [2], Event = AAA gets dynamic attrs 00:03:16: PPPATM: ATM1/0.10 0/101 [2], Event = AAA gets dynamic attrs 00:03:16: PPPATM: ATM1/0.10 0/101 [2], Event = AAA unique id allocated 00:03:16: PPPATM: ATM1/0.10 0/101 [2], Event = No AAA method list set 00:03:16: PPPATM: ATM1/0.10 0/101 [2], Event = SSS Request 00:03:16: PPPATM: ATM1/0.10 0/101 [2], State = NAS_PORT_POLICY_INQUIRY 00:03:16: PPPATM: ATM1/0.10 0/101 [2], Event = SSS Msg Received = 1 00:03:16: PPPATM: ATM1/0.10 0/101 [2], State = PPP_START 00:03:16: PPPATM: ATM1/0.10 0/101 [2], Event = PPP Msg Received = 1 00:03:16: PPPATM: ATM1/0.10 0/101 [2], State = LCP_NEGOTIATION 00:03:27: PPPATM: ATM1/0.10 0/101 [2], Event = PPP Msg Received = 4 00:03:27: PPPATM: ATM1/0.10 0/101 [2], Event = HW Switch support FORW = 0 00:03:27: PPPATM: ATM1/0.10 0/101 [2], Event = Access IE get nas port 00:03:27: PPPATM: ATM1/0.10 0/101 [2], Event = AAA gets dynamic attrs 00:03:27: PPPATM: ATM1/0.10 0/101 [2], Event = AAA gets dynamic attrs 00:03:27: PPPATM: ATM1/0.10 0/101 [2], Event = PPP Msg Received = 5 00:03:27: PPPATM: ATM1/0.10 0/101 [2], Event = Set Pkts to SSS 00:03:27: PPPATM: ATM1/0.10 0/101 [2], State = FORWARDED Table 1 describes the significant fields shown in the display. Table 1 Field Event State debug pppatm Field Descriptions Description Reports PPPoA events for use by Cisco engineering technical assistance personnel. Reports PPPoA states for use by Cisco engineering technical assistance personnel. Related Commands Command atm pppatm passive show pppatm summary Description Places an ATM subinterface into passive mode. Displays PPPoA session counts. 7

debug sss aaa authorization event Subcriber Service Switch debug sss aaa authorization event To display messages about authentication, authorization, and accounting (AAA) authorization events that are part of normal call establishment, use the debug sss aaa authorization event command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug sss aaa authorization event no debug sss aaa authorization event Syntax Description This command has no arguments or keywords. Defaults No default behavior or values Command Modes Privileged EXEC Command History Release 12.2(13)T 12.2(28)SB Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. Examples The following is sample output of several Subscriber Service Switch (SSS) debug commands including the debug sss aaa authorization event command. The reports from these commands should be sent to technical personnel at Cisco Systems for evaluation. Router# debug sss event Router# debug sss error Router# debug sss state Router# debug sss aaa authorization event Router# debug sss aaa authorization fsm SSS: SSS events debugging is on SSS error debugging is on SSS fsm debugging is on SSS AAA authorization event debugging is on SSS AAA authorization FSM debugging is on *Mar 4 21:33:18.248: SSS INFO: Element type is Access-Type, long value is 3 *Mar 4 21:33:18.248: SSS INFO: Element type is Switch-Id, long value is -1509949436 *Mar 4 21:33:18.248: SSS INFO: Element type is Nasport, ptr value is 6396882C *Mar 4 21:33:18.248: SSS INFO: Element type is AAA-Id, long value is 7 *Mar 4 21:33:18.248: SSS INFO: Element type is AAA-ACCT_ENBL, long value is 1 *Mar 4 21:33:18.248: SSS INFO: Element type is AccIe-Hdl, ptr value is 78000006 *Mar 4 21:33:18.248: SSS MGR [uid:7]: Event service-request, state changed from wait-for-req to wait-for-auth *Mar 4 21:33:18.248: SSS MGR [uid:7]: Handling Policy Authorize (1 pending sessions) *Mar 4 21:33:18.248: SSS PM [uid:7]: Need the following key: Unauth-User *Mar 4 21:33:18.248: SSS PM [uid:7]: Received Service Request 8

debug sss aaa authorization event *Mar 4 21:33:18.248: SSS PM [uid:7]: Event <need keys>, State: initial-req to need-init-keys *Mar 4 21:33:18.248: SSS PM [uid:7]: Policy reply - Need more keys *Mar 4 21:33:18.248: SSS MGR [uid:7]: Got reply Need-More-Keys from PM *Mar 4 21:33:18.248: SSS MGR [uid:7]: Event policy-or-mgr-more-keys, state changed from wait-for-auth to wait-for-req *Mar 4 21:33:18.248: SSS MGR [uid:7]: Handling More-Keys event *Mar 4 21:33:20.256: SSS INFO: Element type is Unauth-User, string value is nobody2@xyz.com *Mar 4 21:33:20.256: SSS INFO: Element type is AccIe-Hdl, ptr value is 78000006 *Mar 4 21:33:20.256: SSS INFO: Element type is AAA-Id, long value is 7 *Mar 4 21:33:20.256: SSS INFO: Element type is Access-Type, long value is 0 *Mar 4 21:33:20.256: SSS MGR [uid:7]: Event service-request, state changed from wait-for-req to wait-for-auth *Mar 4 21:33:20.256: SSS MGR [uid:7]: Handling Policy Authorize (1 pending sessions) *Mar 4 21:33:20.256: SSS PM [uid:7]: Received More Initial Keys *Mar 4 21:33:20.256: SSS PM [uid:7]: Event <rcvd keys>, State: need-init-keys to check-auth-needed *Mar 4 21:33:20.256: SSS PM [uid:7]: Handling Authorization Check *Mar 4 21:33:20.256: SSS PM [uid:7]: Event <send auth>, State: check-auth-needed to authorizing *Mar 4 21:33:20.256: SSS PM [uid:7]: Handling AAA service Authorization *Mar 4 21:33:20.256: SSS PM [uid:7]: Sending authorization request for 'xyz.com' *Mar 4 21:33:20.256: SSS AAA AUTHOR [uid:7]:event <make request>, state changed from idle to authorizing *Mar 4 21:33:20.256: SSS AAA AUTHOR [uid:7]:authorizing key xyz.com *Mar 4 21:33:20.260: SSS AAA AUTHOR [uid:7]:aaa request sent for key xyz.com *Mar 4 21:33:20.260: SSS AAA AUTHOR [uid:7]:received an AAA pass *Mar 4 21:33:20.260: SSS AAA AUTHOR [uid:7]:event <found service>, state changed from authorizing to complete *Mar 4 21:33:20.260: SSS AAA AUTHOR [uid:7]:found service info for key xyz.com *Mar 4 21:33:20.260: SSS AAA AUTHOR [uid:7]:event <free request>, state changed from complete to terminal *Mar 4 21:33:20.260: SSS AAA AUTHOR [uid:7]:free request *Mar 4 21:33:20.264: SSS PM [uid:7]: Event <found>, State: authorizing to end *Mar 4 21:33:20.264: SSS PM [uid:7]: Handling Service Direction *Mar 4 21:33:20.264: SSS PM [uid:7]: Policy reply - Forwarding *Mar 4 21:33:20.264: SSS MGR [uid:7]: Got reply Forwarding from PM *Mar 4 21:33:20.264: SSS MGR [uid:7]: Event policy-start-service-fsp, state changed from wait-for-auth to wait-for-service *Mar 4 21:33:20.264: SSS MGR [uid:7]: Handling Connect-Forwarding-Service event *Mar 4 21:33:20.272: SSS MGR [uid:7]: Event service-fsp-connected, state changed from wait-for-service to connected *Mar 4 21:33:20.272: SSS MGR [uid:7]: Handling Forwarding-Service-Connected event Related Commands Command Description debug sss aaa authorization fsm Displays information about AAA authorization state changes. debug sss error Displays diagnostic information about errors that may occur during Subscriber Service Switch call setup. debug sss event Displays diagnostic information about Subscriber Service Switch call setup events. debug sss fsm Displays diagnostic information about the Subscriber Service Switch call setup state. 9

debug sss aaa authorization fsm Subcriber Service Switch debug sss aaa authorization fsm To display information about authentication, authorization, and accounting (AAA) authorization state changes, use the debug sss aaa authorization fsm command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug sss aaa authorization fsm no debug sss aaa authorization fsm Syntax Description This command has no arguments or keywords. Defaults No default behavior or values Command Modes Privileged EXEC Command History Release 12.2(13)T 12.2(28)SB Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. Examples The following example shows how to enter this command. See the Examples section of the debug sss aaa authorization event command page for an example of output. Router# debug sss aaa authorization fsm Related Commands Command debug sss aaa authorization event debug sss error debug sss event debug sss fsm Description Displays messages about AAA authorization events that are part of normal call establishment. Displays diagnostic information about errors that may occur during Subscriber Service Switch call setup. Displays diagnostic information about Subscriber Service Switch call setup events. Displays diagnostic information about the Subscriber Service Switch call setup state. 10

debug sss error debug sss error To display diagnostic information about errors that may occur during Subscriber Service Switch (SSS) call setup, use the debug sss error command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug sss error no debug sss error Syntax Description This command has no arguments or keywords. Defaults No default behavior or values Command Modes Privileged EXEC Command History Release 12.2(13)T 12.2(28)SB Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. Examples The following example shows how to enter this command. See the Examples section of the debug sss aaa authorization event command page for an example of output. Router# debug sss error Related Commands Command debug sss aaa authorization event debug sss aaa authorization fsm debug sss event debug sss fsm Description Displays messages about AAA authorization events that are part of normal call establishment. Displays information about AAA authorization state changes. Displays diagnostic information about Subscriber Service Switch call setup events. Displays diagnostic information about the Subscriber Service Switch call setup state. 11

debug sss event Subcriber Service Switch debug sss event To display diagnostic information about Subscriber Service Switch (SSS) call setup events, use the debug sss event command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug sss event no debug sss event Syntax Description This command has no arguments or keywords. Defaults No default behavior or values Command Modes Privileged EXEC Command History Release 12.2(13)T 12.2(28)SB Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. Examples The following example shows how to enter this command. See the Examples section of the debug sss aaa authorization eventcommand page for an example of output. Router# debug sss event Related Commands Command debug sss aaa authorization event debug sss aaa authorization fsm debug sss error debug sss fsm Description Displays messages about AAA authorization events that are part of normal call establishment. Displays information about AAA authorization state changes. Displays diagnostic information about errors that may occur during Subscriber Service Switch call setup. Displays diagnostic information about the Subscriber Service Switch call setup state. 12

debug sss fsm debug sss fsm To display diagnostic information about the Subscriber Service Switch (SSS) call setup state, use the debug sss fsm command in privileged EXEC mode. To disable debugging output, use the no form of this command. debug sss fsm no debug sss fsm Syntax Description This command has no arguments or keywords. Defaults No default behavior or values Command Modes Privileged EXEC Command History Release 12.2(13)T 12.2(28)SB Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. Examples The following example shows how to enter this command. See the Examples section of the debug sss aaa authorization event command page for an example of output. Router# debug sss fsm 13

multihop-hostname Subcriber Service Switch multihop-hostname To enable a tunnel switch to initiate a tunnel based on the hostname or tunnel ID associated with an ingress tunnel, use the multihop-hostname command in VPDN request-dialin subgroup configuration mode. To disable this option, use the no form of this command. multihop-hostname ingress-tunnel-name no multihop-hostname ingress-tunnel-name Syntax Description ingress-tunnel-name Network access server (NAS) hostname or ingress tunnel ID. Command Default No multihop hostname is configured. Command Modes VPDN request-dialin subgroup configuration Command History Release 12.1(1)DC1 12.2(13)T 12.2(28)SB Modification This command was introduced on the Cisco 6400 node route processor (NRP). This command was integrated into Cisco IOS Release 12.2(13)T. This command was integrated into Cisco IOS Release 12.2(28)SB. Usage Guidelines Use the multihop-hostname command only on a device configured as a tunnel switch. The ingress-tunnel-name argument must specify either the hostname of the device initiating the tunnel that is to be to be switched, or the tunnel ID of the ingress tunnel that is to be switched. Removing the request-dialin subgroup configuration will remove the multihop-hostname configuration. Examples The following example configures a Layer 2 Tunnel Protocol (L2TP) virtual private dialup network (VPDN) group on a tunnel switch to forward ingress sessions from the host named LAC-1 through an outgoing tunnel to IP address 10.3.3.3: vpdn-group 11 request-dialin protocol l2tp multihop-hostname LAC-1 initiate-to ip 10.3.3.3 local name tunnel-switch 14

multihop-hostname Related Commands Command Description dnis Configures a VPDN group to tunnel calls from the specified DNIS, and supports additional domain names for a specific VPDN group. domain Requests that PPP calls from a specific domain name be tunneled, and supports additional domain names for a specific VPDN group. request-dialin Creates a request dial-in VPDN subgroup that configures a NAS to request the establishment of a dial-in tunnel to a tunnel server, and enters request dial-in VPDN subgroup configuration mode. vpdn multihop Enables VPDN multihop. vpdn search order Specifies how the NAS is to perform VPDN tunnel authorization searches. 15

show pppatm summary Subcriber Service Switch show pppatm summary To display PPP over ATM (PPPoA) session counts, use the show pppatm summary command in privileged EXEC mode. show pppatm summary [interface atm interface-number[.subinterface-number]] Syntax Description interface atm interface-number.subinterface-number (Optional) Specifies a particular ATM interface by interface number and possibly a subinterface number. A period (.) must precede the optional subinterface number. Command Modes Privileged EXEC Command History Release 12.2(13)T 12.2(28)SB Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. Usage Guidelines This command is useful for obtaining session counts, the state of the PPPoA sessions, and the interfaces on which they are running. This command gives a summary of the number of PPPoA sessions in each state and the session information of each individual session. If a subinterface number is given in the command, the output is a summary report of the PPPoA sessions in the subinterface. If a main interface number is given, the output will have the summary reports for each individual subinterface of that main interface as shown in the Examples section. If no interface is given, the output will contain the summary reports for each ATM interface on the router. Examples The following example displays PPPoA session counts and states for ATM interface 5/0: Router# show pppatm summary interface atm 5/0 ATM5/0.3: 0 sessions total ATM5/0.6: 1 in PTA (PTA) State 1 sessions total VPI VCI Conn ID PPPoA ID SSS ID PPP ID AAA ID VT VA/SID State 6 101 11 DA000009 BB000013 E5000017 C 1 1.1 PTA Most of the fields displayed by the show pppatm summary command are self-explanatory. Table 2 describes the significant fields shown in the displays. Any data not described in Table 2 is used for internal debugging purposes. 16

show pppatm summary Table 2 Field VPI VCI Conn ID PPPoA ID SSS ID PPP ID AAA ID VT VA/SID State show pppatm summary Field Descriptions Description Virtual path identifier of the permanent virtual circuit (PVC). Virtual channel identifier of the PVC. Unique connection identifier for the PPPoA session. This ID can be correlated with the unique ID in the show vpdn session command output for the forwarded sessions. Internal identifier for the PPPoA session. Internal identifier in the Subscriber Service Switch. Internal identifier in PPP. Authentication, authorization, and accounting (AAA) unique identifier for accounting records. Virtual template number used by the session. PPPoA virtual access number for PPP Termination Aggregation (PTA) sessions, and switch identifier for forwarded sessions. PPPoA state of the session. Related Commands Command clear pppatm interface atm debug pppatm show pppatm trace Description Clears PPP ATM sessions on an ATM interface. Enables reports for PPPoA events, errors, and states either globally or conditionally on an interface or VC. Displays a sequence of PPPoA events, errors, and state changes when the debug pppatm command is enabled. 17

show pppatm trace Subcriber Service Switch show pppatm trace To display a sequence of PPP over ATM (PPPoA) events, errors, and state changes when the debug pppatm command is enabled, use the show pppatm trace command in privileged EXEC mode. show pppatm trace [error event state] interface atm interface-number[.subinterface-number] vc {[vpi/]vci virtual-circuit-name} Syntax Description error event state interface atm interface-number.subinterface-number vc [vpi/]vci virtual-circuit-name (Optional) PPPoA events. (Optional) PPPoA errors. (Optional) PPPoA state. Specifies a particular ATM interface by interface number. (Optional) Specifies a subinterface number preceded by a period. Virtual circuit (VC) keyword followed by a virtual path identifier (VPI) and virtual channel identifier (VCI). The absence of the / and a vpi causes the vpi value to default to 0. Name of the VC. Command Modes Privileged EXEC Command History Release 12.2(13)T 12.2(28)SB Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. Usage Guidelines When the debug pppatm command has been enabled, this command displays messages from the specified permanent virtual circuit (PVC). If only one debug pppatm command keyword is supplied in the command, the report will display only the sequence of events for that particular debug type. Examples The following example traces the debugging messages supplied by the debug pppatm command on PVC 101. The report is used by Cisco technical personnel for diagnosing system problems. Router# debug pppatm trace interface atm 1/0.10 vc 101 Router# debug pppatm state interface atm 1/0.10 vc 101 Router# debug pppatm event interface atm 1/0.10 vc 101 Router# show pppatm trace interface atm 1/0.10 vc 101 Event = Disconnecting Event = AAA gets dynamic attrs Event = AAA gets dynamic attrs Event = SSS Cleanup State = DOWN Event = Up Pending Event = Up Dequeued Event = Processing Up 18

show pppatm trace Event = Access IE allocated Event = Set Pkts to SSS Event = AAA gets retrieved attrs Event = AAA gets nas port details Event = AAA gets dynamic attrs Event = AAA gets dynamic attrs Event = AAA unique id allocated Event = No AAA method list set Event = SSS Request State = NAS_PORT_POLICY_INQUIRY Event = SSS Msg State = PPP_START Event = PPP Msg State = LCP_NEGOTIATION Event = PPP Msg Event = Access IE get nas port Event = AAA gets dynamic attrs Event = AAA gets dynamic attrs Event = PPP Msg Event = Set Pkts to SSS State = FORWARDED Related Commands Command Description clear pppatm interface atm Clears PPP ATM sessions on an ATM interface. debug pppatm Enables reports for PPPoA events, errors, and states either globally or conditionally on an interface or VC. show pppatm summary Displays PPPoA session counts. 19

show sss session Subcriber Service Switch show sss session To display Subscriber Service Switch session status, use the show sss session command in privileged EXEC mode. show sss session [all] Syntax Description all (Optional) Provides an extensive report about the Subscriber Service Switch sessions. Command Modes Privileged EXEC Command History Release 12.2(13)T 12.2(28)SB Modification This command was introduced. This command was integrated into Cisco IOS Release 12.2(28)SB. Usage Guidelines Use this command to verify correct operation of PPP connections in the Subscriber Service Switch environment. Examples The following sample output from the show sss session command provides a basic report of Subscriber Service Switch session activity: Router# show sss session Current SSS Information: Total sessions 9 Uniq ID Type State Service Identifier Last Chg 9 PPPoE/PPP connected VPDN nobody3@cisco.com 00:02:36 10 PPPoE/PPP connected VPDN nobody3@cisco.com 00:01:52 11 PPPoE/PPP connected VPDN nobody3@cisco.com 00:01:52 3 PPPoE/PPP connected VPDN user3@cisco.com 2d21h 6 PPPoE/PPP connected Local Term user1 00:03:35 7 PPPoE/PPP connected Local Term user2 00:03:35 8 PPPoE/PPP connected VPDN nobody3@cisco.com 00:02:36 2 PPP connected Local Term user5 00:05:06 4 PPP connected VPDN nobody2@cisco.com 00:06:52 The following sample output from the show sss session all command provides a more extensive report of Subscriber Service Switch session activity: Router# show sss session all Current SSS Information: Total sessions 9 SSS session handle is 40000013, state is connected, service is VPDN Unique ID is 9 SIP subscriber access type(s) are PPPoE/PPP Identifier is nobody3@cisco.com Last Changed 00:02:49 20

show sss session Root SIP Handle is DF000010, PID is 49 AAA unique ID is 10 Current SIP options are Req Fwding/Req Fwded SSS session handle is B0000017, state is connected, service is VPDN Unique ID is 10 SIP subscriber access type(s) are PPPoE/PPP Identifier is nobody3@cisco.com Last Changed 00:02:05 Root SIP Handle is B9000015, PID is 49 AAA unique ID is 11 Current SIP options are Req Fwding/Req Fwded SSS session handle is D6000019, state is connected, service is VPDN Unique ID is 11 SIP subscriber access type(s) are PPPoE/PPP Identifier is nobody3@cisco.com Last Changed 00:02:13 Root SIP Handle is D0000016, PID is 49 AAA unique ID is 12 Current SIP options are Req Fwding/Req Fwded SSS session handle is 8C000003, state is connected, service is VPDN Unique ID is 3 SIP subscriber access type(s) are PPPoE/PPP Identifier is user3@cisco.com Last Changed 2d21h Root SIP Handle is D3000002, PID is 49 AAA unique ID is 3 Current SIP options are Req Fwding/Req Fwded SSS session handle is BE00000B, state is connected, service is Local Term Unique ID is 6 SIP subscriber access type(s) are PPPoE/PPP Identifier is user1 Last Changed 00:03:56 Root SIP Handle is A9000009, PID is 49 AAA unique ID is 7 Current SIP options are Req Fwding/Req Fwded SSS session handle is DC00000D, state is connected, service is Local Term Unique ID is 7 SIP subscriber access type(s) are PPPoE/PPP Identifier is user2 Last Changed 00:03:57 Root SIP Handle is 2C00000A, PID is 49 AAA unique ID is 8 Current SIP options are Req Fwding/Req Fwded SSS session handle is DB000011, state is connected, service is VPDN Unique ID is 8 SIP subscriber access type(s) are PPPoE/PPP Identifier is nobody3@cisco.com Last Changed 00:02:58 Root SIP Handle is 1000000F, PID is 49 AAA unique ID is 9 Current SIP options are Req Fwding/Req Fwded SSS session handle is 3F000007, state is connected, service is Local Term Unique ID is 2 SIP subscriber access type(s) are PPP Identifier is user5 Last Changed 00:05:30 Root SIP Handle is 8A000009, PID is 92 21

show sss session Subcriber Service Switch AAA unique ID is 1 Current SIP options are Req Fwding/Req Fwded SSS session handle is 97000005, state is connected, service is VPDN Unique ID is 4 SIP subscriber access type(s) are PPP Identifier is nobody2@cisco.com Last Changed 00:07:16 Root SIP Handle is 32000000, PID is 92 AAA unique ID is 5 Current SIP options are Req Fwding/Req Fwded Most of the fields displayed by the show sss session and show sss session all commands are self-explanatory. Table 3 describes the significant fields shown in the displays. Any data not described in Table 3 is used for internal debugging purposes. Table 3 Field Uniq ID Type State Service Identifier Last Chg show sss session Field Descriptions Description The unique identifier used to correlate this particular session with the sessions retrieved from other show commands or debug command traces. Access protocols relevant to this session. Status of the connection, which can be one of the following states: connected The session has been established. wait-for-req Waiting for request. wait-for-auth Waiting for authorization. wait-for-fwd Waiting to be forwarded; for example, waiting for virtual private dialup network (VPDN) service. Type of service given to the user. A string identifying the user. This identifier may either be the username, or the name used to authorize the session. Time interval in in hh:mm:ss since the service for this session was last changed. Related Commands Command show vpdn session Description Displays session information about the L2TP and L2F protocols, and PPPoE tunnels in a VPDN. 22

show vpdn session show vpdn session To display session information about active Layer 2 sessions for a virtual private dialup network (VPDN), use the show vpdn session command in privileged EXEC mode. show vpdn session [l2f l2tp pptp] [all packets sequence state [filter]] Syntax Description l2f l2tp pptp (Optional) Displays information about Layer 2 Forwarding (L2F) calls only. (Optional) Displays information about Layer 2 Tunnel Protocol (L2TP) calls only. (Optional) Displays information about Point-to-Point Tunnel Protocol (PPTP) calls only. all (Optional) Displays extensive reports about active sessions. filter (Optional) One of the filter parameters defined in Table 4. packets (Optional) Displays information about packet and byte counts for sessions. sequence (Optional) Displays sequence information for sessions. state (Optional) Displays state information for sessions. Command Modes Privileged EXEC Command History Release Modification 11.2 This command was introduced. 12.1(1)T This command was enhanced to display Point-to-Point Protocol over Ethernet (PPPoE) session information. Support was added for the packets and all keywords. 12.1(2)T This command was enhanced to display PPPoE session information on actual Ethernet interfaces. 12.2(13)T Reports from this command were enhanced with a unique identifier that can be used to correlate a particular session with the session information retrieved from other show commands or debug command traces. 12.3(2)T Support was added for the l2f, l2tp, and pptp keywords. 12.2(28)SB This command was integrated into Cisco IOS Release 12.2(28)SB. Usage Guidelines Use the show vpdn session command to display information about all active sessions using L2TP, L2F, and PPTP. The output of the show vpdn session command displays PPPoE session information as well. PPPoE is supported on ATM permanent virtual connections (PVCs) compliant with RFC 1483 only. PPPoE is not supported on Frame Relay and any other LAN interfaces such as FDDI and Token Ring. Reports and options for this command depend upon the configuration in which it is used. Use the command-line question mark (?) help function to display options available with the show vpdn session command. Table 4 defines the filter parameters available to refine the output of the show vpdn session command. You may use any one of the filter parameters in place of the filter argument. 23

show vpdn session Subcriber Service Switch Table 4 Filter Parameters for the show vpdn session Command Syntax interface serial number interface virtual-template number tunnel id tunnel-id session-id tunnel remote-name remote-name local-name username username Description Filters the output to display only information for sessions associated with the specified serial interface. number The serial interface number. Filters the output to display only information for sessions associated with the specified virtual template. number The virtual template number. Filters the output to display only information for sessions associated with the specified tunnel ID and session ID. tunnel-id The local tunnel ID. Valid values range from 1 to 65535. session-id The local session ID. Valid values range from 1 to 65535. Filters the output to display only information for sessions associated with the tunnel with the specified names. remote-name The remote tunnel name. local-name The local tunnel name. Filters the output to display only information for sessions associated with the specified username. username The username. Examples The show vpdn session command provides reports on call activity for all active sessions. The following output is from a device carrying active L2TP, L2F, and PPPoE sessions: Router# show vpdn session L2TP Session Information Total tunnels 1 sessions 4 LocID RemID TunID Intf Username State Last Chg Uniq ID 4 691 13695 Se0/0 nobody2@cisco.com est 00:06:00 4 5 692 13695 SSS Circuit nobody1@cisco.com est 00:01:43 8 6 693 13695 SSS Circuit nobody1@cisco.com est 00:01:43 9 3 690 13695 SSS Circuit nobody3@cisco.com est 2d21h 3 L2F Session Information Total tunnels 1 sessions 2 CLID MID Username Intf State Uniq ID 1 2 nobody@cisco.com SSS Circuit open 10 1 3 nobody@cisco.com SSS Circuit open 11 %No active PPTP tunnels PPPoE Session Information Total tunnels 1 sessions 7 PPPoE Session Information UID SID RemMAC OIntf Intf Session LocMAC VASt state 3 1 0030.949b.b4a0 Fa2/0 N/A CNCT_FWDED 0010.7b90.0840 24

show vpdn session 6 2 0030.949b.b4a0 Fa2/0 Vi1.1 CNCT_PTA 0010.7b90.0840 UP 7 3 0030.949b.b4a0 Fa2/0 Vi1.2 CNCT_PTA 0010.7b90.0840 UP 8 4 0030.949b.b4a0 Fa2/0 N/A CNCT_FWDED 0010.7b90.0840 9 5 0030.949b.b4a0 Fa2/0 N/A CNCT_FWDED 0010.7b90.0840 10 6 0030.949b.b4a0 Fa2/0 N/A CNCT_FWDED 0010.7b90.0840 11 7 0030.949b.b4a0 Fa2/0 N/A CNCT_FWDED 0010.7b90.0840 Table 5 describes the significant fields in the show vpdn session display. Table 5 Field LocID RemID TunID Intf Username State Last Chg Uniq ID CLID MID UID SID RemMAC LocMAC OIntf show vpdn session Field Descriptions Description Local identifier. Remote identifier. Tunnel identifier. Interface associated with the session. User domain name. Status for the individual user in the tunnel; can be one of the following states: est opening open closing closed waiting_for_tunnel The waiting_for_tunnel state means that the user connection is waiting until the main tunnel can be brought up before it moves to the opening state. Time interval (in hh:mm:ss) since the last change occurred. The unique identifier used to correlate this particular session with the sessions retrieved from other show commands or debug command traces. A number uniquely identifying the session. A number uniquely identifying this user in this tunnel. PPPoE user ID. PPPoE session ID. Remote MAC address of the host. Local MAC address of the router. It is the default MAC address of the router. Outgoing interface. 25

show vpdn session Subcriber Service Switch Table 5 Field Intf VASt Session state show vpdn session Field Descriptions (continued) Description Virtual access interface number and state. PPPoE session state. The show vpdn session packets command provides reports on call activity for all the currently active sessions. The following output is from a device carrying an active PPPoE session: Router# show vpdn session packets %No active L2TP tunnels %No active L2F tunnels PPPoE Session Information Total tunnels 1 sessions 1 PPPoE Session Information SID Pkts-In Pkts-Out Bytes-In Bytes-Out 1 202333 202337 2832652 2832716 Table 6 describes the significant fields shown in the show vpdn session packets command display. Table 6 Field SID Pkts-In Pkts-Out Bytes-In Bytes-Out show vpdn session packets Field Descriptions Description Session ID for the PPPoE session. Number of packets coming into this session. Number of packets going out of this session. Number of bytes coming into this session. Number of bytes going out of this session. The show vpdn session all command provides extensive reports on call activity for all the currently active sessions. The following output is from a device carrying active L2TP, L2F, and PPPoE sessions: Router# show vpdn session all L2TP Session Information Total tunnels 1 sessions 4 Session id 5 is up, tunnel id 13695 Call serial number is 3355500002 Remote tunnel name is User03 Internet address is 10.0.0.63 Session state is established, time since change 00:03:53 52 Packets sent, 52 received 2080 Bytes sent, 1316 received Last clearing of "show vpdn" counters never Session MTU is 1464 bytes Session username is nobody@cisco.com Interface Remote session id is 692, remote tunnel id 58582 UDP checksums are disabled SSS switching enabled No FS cached header information available Sequencing is off Unique ID is 8 Session id 6 is up, tunnel id 13695 26

show vpdn session Call serial number is 3355500003 Remote tunnel name is User03 Internet address is 10.0.0.63 Session state is established, time since change 00:04:22 52 Packets sent, 52 received 2080 Bytes sent, 1316 received Last clearing of "show vpdn" counters never Session MTU is 1464 bytes Session username is nobody@cisco.com Interface Remote session id is 693, remote tunnel id 58582 UDP checksums are disabled SSS switching enabled No FS cached header information available Sequencing is off Unique ID is 9 Session id 3 is up, tunnel id 13695 Call serial number is 3355500000 Remote tunnel name is User03 Internet address is 10.0.0.63 Session state is established, time since change 2d21h 48693 Packets sent, 48692 received 1947720 Bytes sent, 1314568 received Last clearing of "show vpdn" counters never Session MTU is 1464 bytes Session username is nobody2@cisco.com Interface Remote session id is 690, remote tunnel id 58582 UDP checksums are disabled SSS switching enabled No FS cached header information available Sequencing is off Unique ID is 3 Session id 4 is up, tunnel id 13695 Call serial number is 3355500001 Remote tunnel name is User03 Internet address is 10.0.0.63 Session state is established, time since change 00:08:40 109 Packets sent, 3 received 1756 Bytes sent, 54 received Last clearing of "show vpdn" counters never Session MTU is 1464 bytes Session username is nobody@cisco.com Interface Se0/0 Remote session id is 691, remote tunnel id 58582 UDP checksums are disabled IDB switching enabled FS cached header information: encap size = 36 bytes 4500001C BDDC0000 FF11E977 0A00003E 0A00003F 06A506A5 00080000 0202E4D6 02B30000 Sequencing is off Unique ID is 4 L2F Session Information Total tunnels 1 sessions 2 MID: 2 User: nobody@cisco.com Interface: State: open Packets out: 53 Bytes out: 2264 27

show vpdn session Subcriber Service Switch Packets in: 51 Bytes in: 1274 Unique ID: 10 Last clearing of "show vpdn" counters never MID: 3 User: nobody@cisco.com Interface: State: open Packets out: 53 Bytes out: 2264 Packets in: 51 Bytes in: 1274 Unique ID: 11 Last clearing of "show vpdn" counters never %No active PPTP tunnels PPPoE Session Information Total tunnels 1 sessions 7 PPPoE Session Information SID Pkts-In Pkts-Out Bytes-In Bytes-Out 1 48696 48696 681765 1314657 2 71 73 1019 1043 3 71 73 1019 1043 4 61 62 879 1567 5 61 62 879 1567 6 55 55 791 1363 7 55 55 795 1363 The significant fields shown in the show vpdn session all command display are similar to those defined in Table 5 and Table 6. Related Commands Command Description show sss session Displays Subscriber Service Switch session status. show vpdn Displays basic information about all active VPDN tunnels. show vpdn domain Displays all VPDN domains and DNIS groups configured on the NAS. show vpdn group Displays a summary of the relationships among VPDN groups and customer/vpdn profiles, or summarizes the configuration of a VPDN group including DNIS/domain, load sharing information, and current session information. show vpdn history Displays the content of the failure history table. failure show vpdn multilink Displays the multilink sessions authorized for all VPDN groups. show vpdn redirect Displays statistics for L2TP redirects and forwards. show vpdn tunnel Displays information about active Layer 2 tunnels for a VPDN. 28

subscriber access subscriber access To configure a network access server (NAS) to enable Subscriber Service Switch (SSS) to preauthorize the NAS port identifier (NAS-Port-ID) string before authorizing the domain name, use the subscriber access command in global configuration mode. To disable SSS preauthorization, use the no form of this command. subscriber access {pppoe pppoa} pre-authorize nas-port-id [default list-name] [send username] no subscriber access {pppoe pppoa} pre-authorize nas-port-id Syntax Description pppoe Specifies PPP over Ethernet (PPPoE). pppoa Specifies PPP over ATM (PPPoATM). pre-authorize nas-port-id Signals SSS to preauthorize the NAS-Port-ID string before authorizing the domain name. default (Optional) Uses the default method list name instead of the named list-name argument. list-name (Optional) Authentication, authorization, and accounting (AAA) authorization configured on the LAC. send username (Optional) Specifies to send the authentication username of the session in the Change_Info attribute (attribute 77). Defaults Preauthorization is disabled. Command Modes Global configuration Command History Release Modification 12.2(8)B This command was introduced on the Cisco 6400 series, the Cisco 7200 series, and the Cisco 7401 Application Specific Router (ASR). 12.2(13)T This command was integrated into Cisco IOS Release 12.2(13)T, and the pppoe and pppoa keywords were added. 12.4(2)T The send username keyword was added. 12.3(14)YM2 This command was integrated into Cisco IOS Release 12.3(14)YM2 and implemented on the Cisco 7301, Cisco 7204VXR, and Cisco 7206VXR routers. 12.2(28)SB This command was integrated into Cisco IOS Release 12.2(28)SB. 29

subscriber access Subcriber Service Switch Usage Guidelines The NAS-Port-ID string is used to locate the first service record, which may contain one of three attributes, as follows: A restricted set of values for the domain substring of the unauthenticated PPP name. This filtered service key then locates the final service. See the vpdn authorize domain command for more information. PPPoE session limit. The logical line ID (LLID). Once NAS port authorization has taken place, normal authorization, which is usually the domain authorization, continues. Logical Line ID The LLID is an alphanumeric string of from 1 to 253 characters that serves as the logical identification of a subscriber line. LLID is maintained in a RADIUS server customer profile database and enables users to track their customers on the basis of the physical lines on which customer calls originate. Downloading the LLID is also referred to as preauthorization because it occurs before normal virtual private dialup network (VPDN) authorization downloads L2TP tunnel information. This command enables LLID and SSS querying only for PPP over Ethernet over ATM (PPPoEoATM) and PPP over Ethernet over VLAN (PPPoEoVLAN or Dot1Q) calls; all other calls, such as ISDN, are not supported. Per-NAS-Port Session Limits for PPPoE Use this command to configure SSS preauthorization on the LAC so that the PPPoE per-nas-port session limit can be downloaded from the customer profile database. To use PPPoE per-nas-port session limits, you must also configure the PPPoE Session-Limit per NAS-Port Cisco attribute-value pair in the user profile. Examples The following example signals SSS to preauthorize the NAS-Port-ID string before authorizing the domain name. This policy applies only to sessions that have a PPPoE access type. aaa new-model aaa group server radius sg_llid server 172.20.164.106 auth-port 1645 acct-port 1646 aaa group server radius sg_group server 172.20.164.106 auth-port 1645 acct-port 1646 aaa authentication ppp default group radius aaa authorization confg-commands aaa authorization network default group sg_group aaa authorization network mlist_llid group sg_llid aaa session-id common username s7200_2 password 0 lab username s5300 password 0 lab username sg_group password 0 lab vpdn enable vpdn-group 2 request-dialin protocol 12tp domain example.com initiate-to ip 10.1.1.1 local name s7200_2 vpdn-group 3 30

subscriber access accept dialin protocol pppoe virtual-template 1 Signals Subscriber Service Switch to preauthorize the NAS-Port-ID string before authorizing the domain name. subscriber access pppoe pre-authorize nas-port-id mlist_llid interface Loopback0 ip address 10.1.1.2 255.255.255.0 interface Loopback1 ip address 10.1.1.1 255.255.255.0 interface Ethernet1/0 ip address 10.2.2.2 255.255.255.0 secondary ip address 10.0.58.111 255.255.255.0 no cdp enable interface ATM4/0 no ip address no atm ilmi-keepalive interface ATM4/0.1 point-to-point pvc 1/100 encapsulation aa15snap protocol pppoe interface virtual-template1 no ip unnumbered Loopback0 no peer default ip address ppp authentication chap radius-server host 172.20.164.120 auth-port 1645 acct-port 1646 key rad123 radius-server host 172.20.164.106 auth-port 1645 acct-port 1646 key rad123 ip radius source-interface Loopback1 The following example is identical to the previous example except that it also adds support for sending the PPP authenticating username with the preauthorization in the Connect-Info attribute. This example also includes command-line interface (CLI) suppression on the LLID if the username that is used to authenticate has a domain that includes #184. aaa new-model aaa group server radius sg_llid server 172.31.164.106 auth-port 1645 acct-port 1646 aaa group server radius sg_group server 172.31.164.106 auth-port 1645 acct-port 1646 aaa authentication ppp default group radius aaa authorization confg-commands aaa authorization network default group sg_group aaa authorization network mlist_llid group sg_llid aaa session-id common username s7200_2 password 0 lab username s5300 password 0 lab username sg_group password 0 lab vpdn enable vpdn-group 2 request-dialin protocol 12tp domain example.com domain example.com#184 31